Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0135 (GCVE-0-2021-0135)
Vulnerability from cvelistv5
- escalation of privilege
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Ethernet Diagnostic Driver for Windows | Version: before version 1.4.0.10 | 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Ethernet Diagnostic Driver for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 1.4.0.10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-17T19:26:36",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0135",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Ethernet Diagnostic Driver for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 1.4.0.10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0135",
    "datePublished": "2021-11-17T19:26:36",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-0135\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2021-11-17T20:15:09.133\",\"lastModified\":\"2024-11-21T05:42:02.213\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de entrada inapropiada en el controlador de diagn\u00f3stico Intel\u00ae Ethernet para Windows versiones anteriores a 1.4.0.10, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:ethernet_diagnostic_driver:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"1.4.0.10\",\"matchCriteriaId\":\"FFC09764-C818-4981-B965-AF61C5B11978\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}
  CERTFR-2021-AVI-858
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK | ||
| Intel | N/A | Intel® Pentium® Processor N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series | ||
| Intel | N/A | Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7 | ||
| Intel | N/A | 700-series Ethernet Adapters | ||
| Intel | N/A | Intel SSD DC P4608 Series toutes versions. | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC710. | ||
| Intel | N/A | Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Pentium® Silver Processor Series | ||
| Intel | N/A | Intel® P4510 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX210 | ||
| Intel | N/A | All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10. | ||
| Intel | N/A | Intel® Pentium® Processor J Series, N Series | ||
| Intel | N/A | Intel SSD DC P4600 Series toutes versions. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3168 | ||
| Intel | N/A | Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477 | ||
| Intel | N/A | Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W | ||
| Intel | N/A | Intel® P4618 series versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3. | ||
| Intel | N/A | Intel® NUC Kit: NUC6CAYH, NUC6CAYS | ||
| Intel | N/A | Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA | ||
| Intel | N/A | Intel® Wi-Fi 6 AX201 | ||
| Intel | N/A | 10th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8265 | ||
| Intel | N/A | Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4. | ||
| Intel | N/A | Intel SSD D5-P4420 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C | ||
| Intel | N/A | Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22. | ||
| Intel | N/A | Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2. | ||
| Intel | N/A | Intel® Wireless-AC 9462 | ||
| Intel | N/A | Intel® P4511 series (M.2) versions antérieures à VDV10384. | ||
| Intel | N/A | Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1. | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC | ||
| Intel | N/A | Intel® P4510 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC | ||
| Intel | N/A | Intel® Wireless-AC 9560 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710 | ||
| Intel | N/A | Intel® NUC 8 Rugged Kit NUC8CCHKR | ||
| Intel | N/A | Intel® Wi-Fi 6E AX210 | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA | ||
| Intel | N/A | Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE | ||
| Intel | N/A | 7th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10. | ||
| Intel | N/A | Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA | ||
| Intel | N/A | Intel® Xeon® Processor W Family | ||
| Intel | N/A | Intel® Atom® Processor A Series | ||
| Intel | N/A | Intel® EMA versions antérieures à 1.5.0. | ||
| Intel | N/A | Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10. | ||
| Intel | N/A | Intel® Wireless 7265 (Rev D) Family | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW | ||
| Intel | N/A | Intel® NUC Board NUC8CCHB | ||
| Intel | N/A | Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21. | ||
| Intel | N/A | Intel® P4511 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Killer™ Wi-Fi 6 AX1650 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX200 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC510. | ||
| Intel | N/A | Intel® NUC Board NUC7i3DNBE | ||
| Intel | N/A | Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB | ||
| Intel | N/A | Killer™ Wireless-AC 1550 | ||
| Intel | N/A | Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7 | ||
| Intel | N/A | Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN | ||
| Intel | N/A | 3rd Generation Intel® Xeon® Scalable Processors | ||
| Intel | N/A | Intel SSD D7-P5608 Series versions antérieures à 2CV1R106. | ||
| Intel | N/A | Intel® Celeron® Processor J Series, N Series | ||
| Intel | N/A | Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB | ||
| Intel | N/A | Intel® Atom® Processor E3900 Series | ||
| Intel | N/A | Intel® SSD DC D4512 versions antérieures à ET10. | ||
| Intel | N/A | Intel® Core™ X-series Processors | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Wireless-AC 9260 | ||
| Intel | N/A | Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316. | ||
| Intel | N/A | Intel® NUC 8 Pro Board NUC8i3PNB | ||
| Intel | N/A | Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140. | ||
| Intel | N/A | Killer™ Wi-Fi 6E AX1675 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1. | ||
| Intel | N/A | Intel® P4610 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Wireless-AC 9461 | ||
| Intel | N/A | Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021. | ||
| Intel | N/A | Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL | ||
| Intel | N/A | Intel® VTune™ Profiler versions antérieures à 2021.3.0. | ||
| Intel | N/A | Intel® NUC Kit: NUC7CJYH, NUC7PJYH | ||
| Intel | N/A | 11th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel SSD DC P4500 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK | ||
| Intel | N/A | Intel SSD D5-P4326 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4501 Series toutes versions. | ||
| Intel | N/A | Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0 | ||
| Intel | N/A | Intel® Celeron® Processor N Series | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC | ||
| Intel | N/A | Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel SSD D5-P4320 Series toutes versions. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8260 | ||
| Intel | N/A | Intel® Battery Life Diagnostic Tool versions antérieures à 1.2. | ||
| Intel | N/A | Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA | ||
| Intel | N/A | Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX | ||
| Intel | N/A | Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029. | ||
| Intel | N/A | Intel® Xeon® Processor E3 v6 Family | ||
| Intel | N/A | Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0. | ||
| Intel | N/A | Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows. | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE | ||
| Intel | N/A | Intel® Xeon® Processor E Family | ||
| Intel | N/A | Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030. | ||
| Intel | N/A | Intel® Atom® Processor C3000 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3165 | ||
| Intel | N/A | 810-series Ethernet Adapters | ||
| Intel | N/A | Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466. | ||
| Intel | N/A | Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series - Refresh | ||
| Intel | N/A | Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7 | 
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "700-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4608 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4600 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3168",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX201",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "10th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8265",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4420 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9462",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9560",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6E AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "7th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor W Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor A Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless 7265 (Rev D) Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC8CCHB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6 AX1650",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC7i3DNBE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wireless-AC 1550",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 X-series Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6E AX1675",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9461",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "11th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4500 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4326 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4501 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4320 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor C3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3165",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "810-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
    },
    {
      "name": "CVE-2020-12981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
    },
    {
      "name": "CVE-2020-12987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
    },
    {
      "name": "CVE-2021-0157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
    },
    {
      "name": "CVE-2020-12899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
    },
    {
      "name": "CVE-2021-33062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
    },
    {
      "name": "CVE-2021-0199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
    },
    {
      "name": "CVE-2021-33089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
    },
    {
      "name": "CVE-2020-12986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
    },
    {
      "name": "CVE-2021-0135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
    },
    {
      "name": "CVE-2021-0065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
    },
    {
      "name": "CVE-2021-0078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
    },
    {
      "name": "CVE-2020-8741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
    },
    {
      "name": "CVE-2021-0053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
    },
    {
      "name": "CVE-2021-33106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
    },
    {
      "name": "CVE-2021-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
    },
    {
      "name": "CVE-2021-0096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
    },
    {
      "name": "CVE-2021-0158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
    },
    {
      "name": "CVE-2021-33092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
    },
    {
      "name": "CVE-2020-12983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
    },
    {
      "name": "CVE-2021-0082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
    },
    {
      "name": "CVE-2021-0079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
    },
    {
      "name": "CVE-2021-33094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
    },
    {
      "name": "CVE-2021-33090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
    },
    {
      "name": "CVE-2020-12893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
    },
    {
      "name": "CVE-2020-12982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
    },
    {
      "name": "CVE-2021-0071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
    },
    {
      "name": "CVE-2020-12980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
    },
    {
      "name": "CVE-2021-33095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
    },
    {
      "name": "CVE-2020-12963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
    },
    {
      "name": "CVE-2021-0151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
    },
    {
      "name": "CVE-2020-12902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
    },
    {
      "name": "CVE-2021-33098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
    },
    {
      "name": "CVE-2021-33118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
    },
    {
      "name": "CVE-2021-0148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
    },
    {
      "name": "CVE-2021-0121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
    },
    {
      "name": "CVE-2021-33071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
    },
    {
      "name": "CVE-2021-33105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
    },
    {
      "name": "CVE-2021-33058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
    },
    {
      "name": "CVE-2021-0200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
    },
    {
      "name": "CVE-2021-33097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
    },
    {
      "name": "CVE-2020-12898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
    },
    {
      "name": "CVE-2021-0152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
    },
    {
      "name": "CVE-2021-0069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
    },
    {
      "name": "CVE-2021-0197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
    },
    {
      "name": "CVE-2020-12901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
    },
    {
      "name": "CVE-2021-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
    },
    {
      "name": "CVE-2020-12985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
    },
    {
      "name": "CVE-2020-12892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
    },
    {
      "name": "CVE-2021-0075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
    },
    {
      "name": "CVE-2021-0120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
    },
    {
      "name": "CVE-2021-0146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
    },
    {
      "name": "CVE-2020-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
    },
    {
      "name": "CVE-2021-33087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
    },
    {
      "name": "CVE-2021-33086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
    },
    {
      "name": "CVE-2020-12904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
    },
    {
      "name": "CVE-2021-33091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
    },
    {
      "name": "CVE-2021-33059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
    },
    {
      "name": "CVE-2021-33088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
    },
    {
      "name": "CVE-2021-0064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
    },
    {
      "name": "CVE-2020-12897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
    },
    {
      "name": "CVE-2020-12894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
    },
    {
      "name": "CVE-2020-12905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
    },
    {
      "name": "CVE-2021-33063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
    },
    {
      "name": "CVE-2020-12903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
    },
    {
      "name": "CVE-2021-33073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
    },
    {
      "name": "CVE-2021-33093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
    },
    {
      "name": "CVE-2021-0110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
    },
    {
      "name": "CVE-2020-12964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
    },
    {
      "name": "CVE-2020-12895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
    }
  ],
  "initial_release_date": "2021-11-10T00:00:00",
  "last_revision_date": "2021-11-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-858",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
    }
  ]
}
  wid-sec-w-2022-2328
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Intel Ethernet Controller bezeichnet Netzwerkkarten (NIC) des Herstellers Intel.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Ethernet Controllern ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-2328 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2328.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-2328 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2328"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-66618 vom 2021-11-10",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-66618"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-66617 vom 2021-11-10",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-66617"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0056-1 vom 2022-01-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0079-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0068-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0090-1 vom 2022-01-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0080-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0181-1 vom 2022-01-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0197-1 vom 2022-01-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0367-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0362-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0366-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010214.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0371-1 vom 2022-02-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0477-1 vom 2022-02-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
        "url": "https://ubuntu.com/security/notices/USN-5343-1"
      },
      {
        "category": "external",
        "summary": "HP Security Bulletin HPSBHF03751 vom 2022-12-15",
        "url": "https://support.hp.com/de-de/document/ish_5024305-5036871-16/HPSBHF03751"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6956287 vom 2023-02-16",
        "url": "https://www.ibm.com/support/pages/node/6956287"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2023-078 vom 2023-07-24",
        "url": "https://www.dell.com/support/kbdoc/de-de/000209536/dsa-2023-078-dell-emc-networking-bios-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12110 vom 2024-02-02",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12110.html"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2024-0002 vom 2024-03-04",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-March/001092.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Ethernet Controller: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-03-04T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:40:00.417+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-2328",
      "initial_release_date": "2021-11-09T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-11-10T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von LENOVO aufgenommen"
        },
        {
          "date": "2022-01-11T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-01-17T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-10T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-13T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-17T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-03-22T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-12-14T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2023-02-16T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-07-23T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-02-04T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-04T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von ORACLE aufgenommen"
        }
      ],
      "status": "final",
      "version": "14"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell BIOS",
            "product": {
              "name": "Dell BIOS",
              "product_id": "T016637",
              "product_identification_helper": {
                "cpe": "cpe:/h:dell:bios:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HP Computer",
            "product": {
              "name": "HP Computer",
              "product_id": "T023191",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HP"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM QRadar SIEM",
            "product": {
              "name": "IBM QRadar SIEM",
              "product_id": "T021415",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:qradar_siem:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Diagnostic Driver \u003c 1.4.0.10",
                "product": {
                  "name": "Intel Ethernet Controller Diagnostic Driver \u003c 1.4.0.10",
                  "product_id": "T020957"
                }
              },
              {
                "category": "product_version_range",
                "name": "700 Series \u003c 8.2",
                "product": {
                  "name": "Intel Ethernet Controller 700 Series \u003c 8.2",
                  "product_id": "T020958"
                }
              },
              {
                "category": "product_version_range",
                "name": "E810 \u003c 1.5.5.6",
                "product": {
                  "name": "Intel Ethernet Controller E810 \u003c 1.5.5.6",
                  "product_id": "T020959"
                }
              },
              {
                "category": "product_version_range",
                "name": "E810 \u003c 1.6.0.6",
                "product": {
                  "name": "Intel Ethernet Controller E810 \u003c 1.6.0.6",
                  "product_id": "T020960"
                }
              },
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.21",
                "product": {
                  "name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.21",
                  "product_id": "T020961"
                }
              },
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.15",
                "product": {
                  "name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.15",
                  "product_id": "T020962"
                }
              },
              {
                "category": "product_version_range",
                "name": "500 Series \u003c 3.17.3",
                "product": {
                  "name": "Intel Ethernet Controller 500 Series \u003c 3.17.3",
                  "product_id": "T020963"
                }
              }
            ],
            "category": "product_name",
            "name": "Ethernet Controller"
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.21",
                "product": {
                  "name": "Lenovo Computer Network Adapter \u003c 1.4.0.21",
                  "product_id": "T006520"
                }
              }
            ],
            "category": "product_name",
            "name": "Lenovo Computer"
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0135",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Intel Ethernet Controller. Der Fehler besteht aufgrund einer unzureichenden Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T023191",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020957",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0135"
    },
    {
      "cve": "CVE-2021-0197",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0197"
    },
    {
      "cve": "CVE-2021-0198",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0198"
    },
    {
      "cve": "CVE-2021-0199",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0199"
    },
    {
      "cve": "CVE-2021-0200",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0200"
    },
    {
      "cve": "CVE-2021-33058",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33058"
    },
    {
      "cve": "CVE-2021-33059",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33059"
    },
    {
      "cve": "CVE-2021-33098",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33098"
    }
  ]
}
  WID-SEC-W-2022-2328
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Intel Ethernet Controller bezeichnet Netzwerkkarten (NIC) des Herstellers Intel.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Ethernet Controllern ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-2328 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2328.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-2328 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2328"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2021-11-09",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-66618 vom 2021-11-10",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-66618"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-66617 vom 2021-11-10",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-66617"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0056-1 vom 2022-01-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0079-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0068-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0090-1 vom 2022-01-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0080-1 vom 2022-01-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0181-1 vom 2022-01-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0197-1 vom 2022-01-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0367-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0362-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0366-1 vom 2022-02-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010214.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0371-1 vom 2022-02-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0477-1 vom 2022-02-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
        "url": "https://ubuntu.com/security/notices/USN-5343-1"
      },
      {
        "category": "external",
        "summary": "HP Security Bulletin HPSBHF03751 vom 2022-12-15",
        "url": "https://support.hp.com/de-de/document/ish_5024305-5036871-16/HPSBHF03751"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6956287 vom 2023-02-16",
        "url": "https://www.ibm.com/support/pages/node/6956287"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2023-078 vom 2023-07-24",
        "url": "https://www.dell.com/support/kbdoc/de-de/000209536/dsa-2023-078-dell-emc-networking-bios-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12110 vom 2024-02-02",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12110.html"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2024-0002 vom 2024-03-04",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-March/001092.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Ethernet Controller: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-03-04T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:40:00.417+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-2328",
      "initial_release_date": "2021-11-09T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-11-10T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von LENOVO aufgenommen"
        },
        {
          "date": "2022-01-11T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-01-17T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-10T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-13T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-17T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-03-22T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-12-14T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2023-02-16T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-07-23T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-02-04T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-04T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von ORACLE aufgenommen"
        }
      ],
      "status": "final",
      "version": "14"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell BIOS",
            "product": {
              "name": "Dell BIOS",
              "product_id": "T016637",
              "product_identification_helper": {
                "cpe": "cpe:/h:dell:bios:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HP Computer",
            "product": {
              "name": "HP Computer",
              "product_id": "T023191",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HP"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM QRadar SIEM",
            "product": {
              "name": "IBM QRadar SIEM",
              "product_id": "T021415",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:qradar_siem:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Diagnostic Driver \u003c 1.4.0.10",
                "product": {
                  "name": "Intel Ethernet Controller Diagnostic Driver \u003c 1.4.0.10",
                  "product_id": "T020957"
                }
              },
              {
                "category": "product_version_range",
                "name": "700 Series \u003c 8.2",
                "product": {
                  "name": "Intel Ethernet Controller 700 Series \u003c 8.2",
                  "product_id": "T020958"
                }
              },
              {
                "category": "product_version_range",
                "name": "E810 \u003c 1.5.5.6",
                "product": {
                  "name": "Intel Ethernet Controller E810 \u003c 1.5.5.6",
                  "product_id": "T020959"
                }
              },
              {
                "category": "product_version_range",
                "name": "E810 \u003c 1.6.0.6",
                "product": {
                  "name": "Intel Ethernet Controller E810 \u003c 1.6.0.6",
                  "product_id": "T020960"
                }
              },
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.21",
                "product": {
                  "name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.21",
                  "product_id": "T020961"
                }
              },
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.15",
                "product": {
                  "name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.15",
                  "product_id": "T020962"
                }
              },
              {
                "category": "product_version_range",
                "name": "500 Series \u003c 3.17.3",
                "product": {
                  "name": "Intel Ethernet Controller 500 Series \u003c 3.17.3",
                  "product_id": "T020963"
                }
              }
            ],
            "category": "product_name",
            "name": "Ethernet Controller"
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Network Adapter \u003c 1.4.0.21",
                "product": {
                  "name": "Lenovo Computer Network Adapter \u003c 1.4.0.21",
                  "product_id": "T006520"
                }
              }
            ],
            "category": "product_name",
            "name": "Lenovo Computer"
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0135",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Intel Ethernet Controller. Der Fehler besteht aufgrund einer unzureichenden Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T023191",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020957",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0135"
    },
    {
      "cve": "CVE-2021-0197",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0197"
    },
    {
      "cve": "CVE-2021-0198",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0198"
    },
    {
      "cve": "CVE-2021-0199",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0199"
    },
    {
      "cve": "CVE-2021-0200",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006520",
          "T023191",
          "T020960",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020959",
          "T020958",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-0200"
    },
    {
      "cve": "CVE-2021-33058",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33058"
    },
    {
      "cve": "CVE-2021-33059",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33059"
    },
    {
      "cve": "CVE-2021-33098",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
        }
      ],
      "product_status": {
        "known_affected": [
          "T020962",
          "T023191",
          "T020961",
          "T002207",
          "T000126",
          "T016637",
          "T021415",
          "T020963",
          "T004914"
        ]
      },
      "release_date": "2021-11-09T23:00:00.000+00:00",
      "title": "CVE-2021-33098"
    }
  ]
}
  fkie_cve-2021-0135
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| intel | ethernet_diagnostic_driver | * | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:ethernet_diagnostic_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "FFC09764-C818-4981-B965-AF61C5B11978",
              "versionEndExcluding": "1.4.0.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el controlador de diagn\u00f3stico Intel\u00ae Ethernet para Windows versiones anteriores a 1.4.0.10, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2021-0135",
  "lastModified": "2024-11-21T05:42:02.213",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-17T20:15:09.133",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-px8h-3j4c-2f46
Vulnerability from github
Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.
{
  "affected": [],
  "aliases": [
    "CVE-2021-0135"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2021-11-17T20:15:00Z",
    "severity": "MODERATE"
  },
  "details": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.",
  "id": "GHSA-px8h-3j4c-2f46",
  "modified": "2022-05-24T19:20:59Z",
  "published": "2022-05-24T19:20:59Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0135"
    },
    {
      "type": "WEB",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  gsd-2021-0135
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2021-0135",
    "description": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.",
    "id": "GSD-2021-0135"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-0135"
      ],
      "details": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.",
      "id": "GSD-2021-0135",
      "modified": "2023-12-13T01:23:07.981289Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secure@intel.com",
        "ID": "CVE-2021-0135",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Intel(R) Ethernet Diagnostic Driver for Windows",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "before version 1.4.0.10"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "escalation of privilege"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html",
            "refsource": "MISC",
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:intel:ethernet_diagnostic_driver:*:*:*:*:*:windows:*:*",
                "cpe_name": [],
                "versionEndExcluding": "1.4.0.10",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0135"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html",
              "refsource": "MISC",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 0.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2021-11-22T13:57Z",
      "publishedDate": "2021-11-17T20:15Z"
    }
  }
}
  var-202111-1148
Vulnerability from variot
Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Ethernet Diagnostic is a network adapter management tool of Intel Corporation
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1148",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ethernet diagnostic driver",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "1.4.0.10"
      },
      {
        "model": "intel ethernet diagnostic \u30c9\u30e9\u30a4\u30d0",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": "intel ethernet diagnostic  driver  1.4.0.10"
      },
      {
        "model": "intel ethernet diagnostic \u30c9\u30e9\u30a4\u30d0",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "cve": "CVE-2021-0135",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-0135",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-371704",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2021-0135",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-0135",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-0135",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-0135",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202111-930",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-371704",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-0135",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Ethernet Diagnostic is a network adapter management tool of Intel Corporation",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-0135",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVNVU91196719",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3728",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021111013",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-371704",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "id": "VAR-202111-1148",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T12:11:19.144000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "INTEL-SA-00524",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
      },
      {
        "title": "Intel Ethernet Diagnostic Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169592"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.1
      },
      {
        "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0135"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu91196719/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021111013"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3728"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-11-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "date": "2021-11-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "date": "2022-11-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "date": "2021-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "date": "2021-11-17T20:15:09.133000",
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-371704"
      },
      {
        "date": "2021-11-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-0135"
      },
      {
        "date": "2022-11-18T02:01:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      },
      {
        "date": "2021-11-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      },
      {
        "date": "2021-11-22T13:57:15.293000",
        "db": "NVD",
        "id": "CVE-2021-0135"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Windows\u00a0 for \u00a0Intel(R)\u00a0Ethernet\u00a0Diagnostic\u00a0 Driver input verification vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-015358"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-930"
      }
    ],
    "trust": 0.6
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.